The conference consists of an intensive day of talks/presentations and discussion with 2 different tracks focusing on the causes and trends in web application insecurity.

+

Welcome to the Irish OWASP Application Security Conference!<br>

−

'''[http://www.owasp.org/index.php/OWASP_IRELAND_2010#Training Training]: (16th September 2010)'''<br>'''''Secure Application Development: Writing secure code (and testing it)''''' training is to be delivered on the 16 September, following the very successful model delivered in 2009 (see more details below)

OWASP is providing sponsors exclusive access to its audience in Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers. The conference is expected to draw 150 - 200 technologists who will be looking for ways to spend their remaining 2010 budget and planning for 2010/11. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented. <br>Sponsorship details are available here:&nbsp; Please review or sponsorship proposal:&nbsp;[http://www.owasp.org/images/c/c8/OWASP_sponsorship_Master.pdf Click_here]

OWASP is providing sponsors exclusive access to its audience in Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers. The conference is expected to draw 150 - 200 technologists who will be looking for ways to spend their remaining 2010 budget and planning for 2010/11. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented. <br>Sponsorship details are available here:&nbsp; Please review or sponsorship proposal:&nbsp;[http://www.owasp.org/images/c/c8/OWASP_sponsorship_Master.pdf Click_here]

<center>

<center>

−

&nbsp;

+

&nbsp;

−

</center>

+

</center>

=== Sponsors ===

=== Sponsors ===

'''Silver Sponsors'''

'''Silver Sponsors'''

<center>

<center>

−

[[Image:Cenzic small 2.GIF]]

+

[[Image:Cenzic small 2.GIF]]

</center><center>

</center><center>

−

'''CENZIC''' - Cenzic provides software and SaaS solutions for dynamic, black box testing of Web applications to protect Websites against hacker attacks.Built from the ground up on a completely different technology backbone than its competitors, Cenzic goes beyond signature-based tools to find more "real" vulnerabilities. To request a free demo please visit http://www.cenzic.com <br>

+

'''CENZIC''' - Cenzic provides software and SaaS solutions for dynamic, black box testing of Web applications to protect Websites against hacker attacks.Built from the ground up on a completely different technology backbone than its competitors, Cenzic goes beyond signature-based tools to find more "real" vulnerabilities. To request a free demo please visit http://www.cenzic.com <br>

'''Veracode''' is the world’s leader in cloud-based application risk management. With patented binary code analysis, dynamic Web assessments, and partner or Veracode-delivered manual penetration testing, combined with developer e-learning and access to open source security ratings, Veracode SecurityReview® allows customers to independently verify application security in both internally developed applications and third-party software without requiring source code or expensive tools. Veracode provides the most simple, complete and accurate way to implement security best practices, reduce operational cost and comply with internal security policies or external standards such as OWASP Top 10, CWE/SANS Top 25 and PCI. Veracode works with global organizations across multiple vertical industries including Barclays PLC, California Public Employees’ Retirement System (CalPERS), Computershare, and the Federal Aviation Administration (FAA). For more information, visit www.veracode.com http://www.veracode.com/

'''Veracode''' is the world’s leader in cloud-based application risk management. With patented binary code analysis, dynamic Web assessments, and partner or Veracode-delivered manual penetration testing, combined with developer e-learning and access to open source security ratings, Veracode SecurityReview® allows customers to independently verify application security in both internally developed applications and third-party software without requiring source code or expensive tools. Veracode provides the most simple, complete and accurate way to implement security best practices, reduce operational cost and comply with internal security policies or external standards such as OWASP Top 10, CWE/SANS Top 25 and PCI. Veracode works with global organizations across multiple vertical industries including Barclays PLC, California Public Employees’ Retirement System (CalPERS), Computershare, and the Federal Aviation Administration (FAA). For more information, visit www.veracode.com http://www.veracode.com/

−

</center>

+

</center>

−

<br><br>

+

<br><br>

−

<center>[[Image:FORTIFY_LOGO_MED.jpg]]</center>

+

<center>[[Image:FORTIFY LOGO MED.jpg]]</center><center>

−

<center>

+

'''Fortify® Software''' is the leader in the emerging category of Software Security Assurance (SSA). Fortify's SSA products and services protect companies from the threats posed by security flaws in business-critical software applications and result in applications that are inherently more secure and impervious to attack. Our solutions help identify and resolve critical application vulnerabilities in less time and at lower cost. http://www.fortify.com

−

'''Fortify® Software''' is the leader in the emerging category of Software Security Assurance (SSA). Fortify's SSA products and services protect companies from the threats posed by security flaws in business-critical software applications and result in applications that are inherently more secure and impervious to attack. Our solutions help identify and resolve critical application vulnerabilities in less time and at lower cost. http://www.fortify.com

+

</center>

−

</center>

+

<br><br>

−

+

<center>[[Image:IBM logo blue high res - small.jpg]]</center><center>

+

IBM Rational® offers Web site security, Web site compliance, and application security solutions for the most comprehensive approach to assessing vulnerabilities in networked applications and critical Web sites. IBM Rational AppScan® and IBM Rational Policy Tester®, Web site security, compliance, and application security solutions, can help you avoid these risks. Our solutions automate application and content analysis. They help you identify vulnerabilities, assess compliance requirements, and improve the accuracy and reliability of online systems.

The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days.

The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days.

'''Abstract'''<br>Writing Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand.

'''Abstract'''<br>Writing Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand.

Line 195:

Line 232:

*Unvalidated Input

*Unvalidated Input

−

*Injection Flaws<br>

+

*Injection Flaws

*Cross-Site Scriping

*Cross-Site Scriping

*CSRF

*CSRF

Line 201:

Line 238:

*Access control &amp; Authorisation

*Access control &amp; Authorisation

*Broken Caching

*Broken Caching

−

*Error Handling

+

*Error Handling &amp;Resource Management

*Cryptography

*Cryptography

−

*Resource Management

+

*Rich Internet Applications

−

*Rich Internet Applications &amp;&nbsp;Webservices

+

*The Secure SDLC

*The Secure SDLC

Line 221:

Line 257:

'''Prerequisite'''

'''Prerequisite'''

−

Basic knowledge of a web programming language like Java or .NET recommended but not required. <br>

+

Basic knowledge of a web programming language like Java or .NET recommended but not required. <br>

Bringing your own windows based laptop is recommended so you can participate in the hands on exercises.

Bringing your own windows based laptop is recommended so you can participate in the hands on exercises.

A hotel has been block booked in the middle of the city for the OWASP Event in Dublin in September:<br>http://www.owasp.org/index.php?title=OWASP_IRELAND_2010<br> <br>The rooms have been booked for the 16th and 17th September and shall be held for OWASP until September 3rd.<br> <br>Hotel in question is The Morgan Hotel:<br>http://www.themorgan.com/<br> <br>Rate - 150 euro per room per night, bed and breakfast <br> <br>Please quote "Trinity College" and contact hotel reservations 01 6437061 or email reservations@themorgan.com <br>

'''Note''': To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accommodate transfers of registrations from one person to another, if such an adjustment becomes necessary.

+

And the winner is... Chris Adams, please contact Alan Deery or Fabio Cerullo to provide you further details on how to claim your prize.

Congratulations to the winner and a big thank you to everyone who took part.

−

= Conference Committee =

+

==== Photos ====

+

+

To be available soon.

+

+

+

==== Conference Committee ====

'''2010 Ireland Planning Committee Chair''':

'''2010 Ireland Planning Committee Chair''':

−

Eoin Keary -&nbsp;eoin.keary 'at' owasp.org

+

Eoin Keary -&nbsp;eoin.keary 'at' owasp.org<br>

−

+

−

<br>

+

Fabio Cerullo&nbsp; - fcerullo 'at' owasp.org

Fabio Cerullo&nbsp; - fcerullo 'at' owasp.org

Line 273:

Line 316:

Rahim Jina - rahim.jina 'at' owasp.org

Rahim Jina - rahim.jina 'at' owasp.org

−

= Call for Papers =

−

−

The Conference will consist of two tracks covering both technical and risk management topics.

−

−

'''We are seeking presentations on any of the following topics:'''

−

−

*Web Services and Application Security

−

*Common Application related Threats and Risks

−

*Business Risks with Application Security

−

*Vulnerability Research in Application Security

−

*Web Application Penetration Testing

−

*OWASP Tools and Projects

−

*Secure Coding/Development Practices

−

*Technology specific presentations on security such as AJAX, XML, etc.

−

*Anything else relating to OWASP and Application Security.

−

−

The call for papers/presentations is out. The official closing date for receiving a synopsis of the presentation is June 10th, 2010. Announcements on selected candidates will be provided the first week of July 2010. Complete presentations will need to be submitted by the 2nd of August 2010.

−

−

All presenters will receive free invitation to the conference, food and refreshments.

−

−

'''For some speakers, OWASP will cover some of the travel costs associated with coming to the conference.'''

−

−

<br>

−

'''Please submit your presentation topics and an abstract of up to 500 words to Eoin Keary''' &lt;mailto: Eoin.keary@owasp.org&gt;

+

<headertabs/>

Latest revision as of 06:19, 25 September 2010

Welcome to the Irish OWASP Application Security Conference!

On September 17th, 2010 OWASP held its second Irish Application Security conference in Dublin University, Trinity College, Dublin, Ireland.

About

The conference consisted of an intensive day of talks/presentations and discussion with 2 different tracks focusing on the causes and trends in web application insecurity.

Finally six months of work by the OWASP Ireland chapter board paid off:

Many thanks :
- To every one who attended, helped out, presented, ran about.
- To Samy Kamkar who came over to enlighten us all about how he'll meet your girlfriend.......
- To John Viega, Fred Piper and Damian Gordon for their keynotes, they were great and provoked much discussion.
- To all our local and international speakers who took time (and expense) to come over and present...
- Also thanks to our sponsors for all assistance.

Venue

Sponsorship

OWASP is providing sponsors exclusive access to its audience in Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers. The conference is expected to draw 150 - 200 technologists who will be looking for ways to spend their remaining 2010 budget and planning for 2010/11. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented. Sponsorship details are available here: Please review or sponsorship proposal: Click_here

Sponsors

Silver Sponsors

CENZIC - Cenzic provides software and SaaS solutions for dynamic, black box testing of Web applications to protect Websites against hacker attacks.Built from the ground up on a completely different technology backbone than its competitors, Cenzic goes beyond signature-based tools to find more "real" vulnerabilities. To request a free demo please visit http://www.cenzic.com

Veracode is the world’s leader in cloud-based application risk management. With patented binary code analysis, dynamic Web assessments, and partner or Veracode-delivered manual penetration testing, combined with developer e-learning and access to open source security ratings, Veracode SecurityReview® allows customers to independently verify application security in both internally developed applications and third-party software without requiring source code or expensive tools. Veracode provides the most simple, complete and accurate way to implement security best practices, reduce operational cost and comply with internal security policies or external standards such as OWASP Top 10, CWE/SANS Top 25 and PCI. Veracode works with global organizations across multiple vertical industries including Barclays PLC, California Public Employees’ Retirement System (CalPERS), Computershare, and the Federal Aviation Administration (FAA). For more information, visit www.veracode.com http://www.veracode.com/

Fortify® Software is the leader in the emerging category of Software Security Assurance (SSA). Fortify's SSA products and services protect companies from the threats posed by security flaws in business-critical software applications and result in applications that are inherently more secure and impervious to attack. Our solutions help identify and resolve critical application vulnerabilities in less time and at lower cost. http://www.fortify.com

IBM Rational® offers Web site security, Web site compliance, and application security solutions for the most comprehensive approach to assessing vulnerabilities in networked applications and critical Web sites. IBM Rational AppScan® and IBM Rational Policy Tester®, Web site security, compliance, and application security solutions, can help you avoid these risks. Our solutions automate application and content analysis. They help you identify vulnerabilities, assess compliance requirements, and improve the accuracy and reliability of online systems.

IBM home page: www.ibm.com/ie

Supported by

Agenda

The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days.

Secure Application Development: Writing secure code (and testing it)

AbstractWriting Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand.

Application security is not commonly a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their software development training efforts. This intensive one-day course focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The course will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code.

This course includes coverage of the following areas:

Unvalidated Input

Injection Flaws

Cross-Site Scriping

CSRF

Authentication & Session Management

Access control & Authorisation

Broken Caching

Error Handling &Resource Management

Cryptography

Rich Internet Applications

The Secure SDLC

Hands on

To cement the principles discussed, students can participate in a number of hands-on security testing exercises where they attack a live web application (i.e., WebGoat etc) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises. Students need to bring their own windows based laptop to participate in the exercises.

Audience

Developers who want to understand the most common web application security flaws, and how to avoid them and code in a secure manner

Level

Intermediate

Prerequisite

Basic knowledge of a web programming language like Java or .NET recommended but not required.

Bringing your own windows based laptop is recommended so you can participate in the hands on exercises.